Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 00:55

General

  • Target

    bin/DemoApp.bat

  • Size

    7KB

  • MD5

    ea8354671cee46be984ae4495f6b0fa7

  • SHA1

    2a15e1d4c55304f54a1367a938a190b3ac799b14

  • SHA256

    2729e14fcf62fe43732a3d9b31ed50714c11788e253c0c6f164e0d6a47b86878

  • SHA512

    06011729d89db02f635665856910d0f0c8c4ccc491ba0cdbd2ac69089b6738412ccd4aa5623cbbf4c4e817929197650589102aabfc603d64acb9ca2ab996dd33

  • SSDEEP

    192:K0/g9LOdESeRXZ8Kl7/fAD1T1yBBjxDcDY6mjX:9g9LOdj+Z8qDfAnSto6

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bin\DemoApp.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Users\Admin\AppData\Local\Temp\bin\wrapper.exe
      "C:\Users\Admin\AppData\Local\Temp\bin\wrapper.exe" -c "../conf/demoapp.conf"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4244
      • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
        "C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe" -version
        3⤵
          PID:3648
        • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
          "C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe" -classpath "../lib/wrapper.jar" -Dfile.encoding=Cp1252 org.tanukisoftware.wrapper.bootstrap.WrapperBootstrap 1 org.tanukisoftware.wrapper.demo.DemoApp 0
          3⤵
            PID:1420

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

        Filesize

        46B

        MD5

        213ce8ccf5140b898e3adc6a3ff9a242

        SHA1

        397f81de11a7eff35c874a6027d08f68fcbccfe3

        SHA256

        df2968cbccf5eb3f736fc8a716e6534d4bd3f1bf41e790a6c8bbdde95d047ade

        SHA512

        37b179a6bf83381c0c26a574bea1ad34862a233cf29db4db9f0d7ab0b8ca2d07fd3764f8d3c7faeda59935c3c1f46d64882fd5656b627fa5b82ee17f4f160dfa

      • memory/1420-21-0x000002DAB0FA0000-0x000002DAB1210000-memory.dmp

        Filesize

        2.4MB

      • memory/1420-32-0x000002DAAF700000-0x000002DAAF701000-memory.dmp

        Filesize

        4KB

      • memory/1420-33-0x000002DAB0FA0000-0x000002DAB1210000-memory.dmp

        Filesize

        2.4MB

      • memory/3648-7-0x0000022F00000000-0x0000022F00270000-memory.dmp

        Filesize

        2.4MB

      • memory/3648-17-0x0000022F73A30000-0x0000022F73A31000-memory.dmp

        Filesize

        4KB

      • memory/3648-18-0x0000022F00000000-0x0000022F00270000-memory.dmp

        Filesize

        2.4MB